Malware Analysis Report

2025-01-19 07:44

Sample ID 240615-alh2kascpe
Target ac30f200d5d711bb540d22b1c36623d2_JaffaCakes118
SHA256 accf5f5ed8ecd22e6fefc7d8ed306c66625d1ed141beb47530ae0e06ed83a088
Tags
score
6/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
6/10

SHA256

accf5f5ed8ecd22e6fefc7d8ed306c66625d1ed141beb47530ae0e06ed83a088

Threat Level: Shows suspicious behavior

The file ac30f200d5d711bb540d22b1c36623d2_JaffaCakes118 was found to be: Shows suspicious behavior.

Malicious Activity Summary


Requests dangerous framework permissions

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-15 00:17

Signatures

Requests dangerous framework permissions

Description Indicator Process Target
Required to be able to access the camera device. android.permission.CAMERA N/A N/A
Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an application to record audio. android.permission.RECORD_AUDIO N/A N/A
Required to be able to access the camera device. android.permission.CAMERA N/A N/A
Allows an application to read or write the system settings. android.permission.WRITE_SETTINGS N/A N/A
Allows an app to access precise location. android.permission.ACCESS_FINE_LOCATION N/A N/A
Allows an app to access approximate location. android.permission.ACCESS_COARSE_LOCATION N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-15 00:17

Reported

2024-06-15 00:21

Platform

android-x86-arm-20240611.1-en

Max time kernel

2s

Max time network

139s

Command Line

com.xn.zn.stamp

Signatures

N/A

Processes

com.xn.zn.stamp

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
GB 216.58.212.238:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.187.206:443 android.apis.google.com tcp

Files

/data/data/com.xn.zn.stamp/files/libjiagu.so

MD5 1f305cc73c270bed19248d4a6f3ef0f0
SHA1 e4472c58f31c888b9fea75ec5da0cc5e01a28233
SHA256 8b2e952c81f82b404f7f01bb4ad842827e015271d46ff035ef8282064445a6e2
SHA512 05ff9ecf56f2d32c5685b091d704cad740f9905ad792dabbf2c4f51517a079adb0f9cb2a74bd3d0c6b41131fc9766a2ae98892aa56dc8aac86a68d67a8d5b0fa

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-15 00:17

Reported

2024-06-15 00:21

Platform

android-x64-20240611.1-en

Max time kernel

3s

Max time network

131s

Command Line

com.xn.zn.stamp

Signatures

N/A

Processes

com.xn.zn.stamp

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
GB 172.217.169.42:443 tcp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 216.58.204.72:443 ssl.google-analytics.com tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.187.238:443 android.apis.google.com tcp
GB 172.217.169.42:443 tcp
GB 142.250.187.206:443 tcp
GB 142.250.187.194:443 tcp
GB 172.217.169.42:443 tcp
GB 172.217.16.228:443 tcp
GB 172.217.16.228:443 tcp
GB 142.250.179.238:443 tcp

Files

/data/data/com.xn.zn.stamp/files/libjiagu.so

MD5 1f305cc73c270bed19248d4a6f3ef0f0
SHA1 e4472c58f31c888b9fea75ec5da0cc5e01a28233
SHA256 8b2e952c81f82b404f7f01bb4ad842827e015271d46ff035ef8282064445a6e2
SHA512 05ff9ecf56f2d32c5685b091d704cad740f9905ad792dabbf2c4f51517a079adb0f9cb2a74bd3d0c6b41131fc9766a2ae98892aa56dc8aac86a68d67a8d5b0fa